Puppet Agent vulnerabilities
12 known vulnerabilities affecting puppet/puppet_agent.
Total CVEs
12
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL4HIGH3MEDIUM5
Vulnerabilities
Page 1 of 1
CVE-2021-27023CRITICALCVSS 9.8fixed in 6.25.1≥ 7.0.0, < 7.12.12021-11-18
CVE-2021-27023 [CRITICAL] CVE-2021-27023: A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credential
A flaw was discovered in Puppet Agent and Puppet Server that may result in a leak of HTTP credentials when following HTTP redirects to a different host. This is similar to CVE-2018-1000007
nvd
CVE-2021-27025MEDIUMCVSS 6.5fixed in 6.25.1≥ 5.5.0, ≤ 5.5.22+1 more2021-11-18
CVE-2021-27025 [MEDIUM] CVE-2021-27025: A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be
A flaw was discovered in Puppet Agent where the agent may silently ignore Augeas settings or may be vulnerable to a Denial of Service condition prior to the first 'pluginsync'.
nvd
CVE-2020-7942MEDIUMCVSS 6.5≥ 5.5.0, < 5.5.19≥ 6.0.0, < 6.13.0+4 more2020-02-19
CVE-2020-7942 [MEDIUM] CWE-295 CVE-2020-7942: Previously, Puppet operated on a model that a node with a valid certificate was entitled to all info
Previously, Puppet operated on a model that a node with a valid certificate was entitled to all information in the system and that a compromised certificate allowed access to everything in the infrastructure. When a node's catalog falls back to the `default` node, the catalog can be retrieved for a different node by modifying facts for the Puppet run.
cvelistv5nvd
CVE-2015-1855MEDIUMCVSS 5.9v1.0.02019-11-29
CVE-2015-1855 [MEDIUM] CWE-20 CVE-2015-1855: verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x befo
verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.
nvd
CVE-2018-6514HIGHCVSS 7.8vPuppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, Puppet Agent 5.5.x prior to 5.5.22018-06-11
CVE-2018-6514 [HIGH] CWE-426 CVE-2018-6514: In Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, Puppet Agent 5.5.x prior
In Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, Puppet Agent 5.5.x prior to 5.5.2, Facter on Windows is vulnerable to a DLL preloading attack, which could lead to a privilege escalation.
cvelistv5nvd
CVE-2018-6515HIGHCVSS 7.8vPuppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, Puppet Agent 5.5.x prior to 5.5.22018-06-11
CVE-2018-6515 [HIGH] CWE-20 CVE-2018-6515: Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prio
Puppet Agent 1.10.x prior to 1.10.13, Puppet Agent 5.3.x prior to 5.3.7, and Puppet Agent 5.5.x prior to 5.5.2 on Windows only, with a specially crafted configuration file an attacker could get pxp-agent to load arbitrary code with privilege escalation.
cvelistv5nvd
CVE-2017-10690MEDIUMCVSS 6.5v5.x prior to 5.3.42018-02-09
CVE-2017-10690 [MEDIUM] CWE-269 CVE-2017-10690: In previous versions of Puppet Agent it was possible for the agent to retrieve facts from an environ
In previous versions of Puppet Agent it was possible for the agent to retrieve facts from an environment that it was not classified to retrieve from. This was resolved in Puppet Agent 5.3.4, included in Puppet Enterprise 2017.3.4
cvelistv5nvd
CVE-2017-10689MEDIUMCVSS 5.5vprior to 5.3.4 or 1.10.102018-02-09
CVE-2017-10689 [MEDIUM] CWE-269 CVE-2017-10689: In previous versions of Puppet Agent it was possible to install a module with world writable permiss
In previous versions of Puppet Agent it was possible to install a module with world writable permissions. Puppet Agent 5.3.4 and 1.10.10 included a fix to this vulnerability.
cvelistv5nvd
CVE-2016-5713CRITICALCVSS 9.8≥ 1.3.0, < 1.6.0vIntroduced in 1.3.0, fixed in 1.6.02017-12-06
CVE-2016-5713 [CRITICAL] CWE-94 CVE-2016-5713: Versions of Puppet Agent prior to 1.6.0 included a version of the Puppet Execution Protocol (PXP) ag
Versions of Puppet Agent prior to 1.6.0 included a version of the Puppet Execution Protocol (PXP) agent that passed environment variables through to Puppet runs. This could allow unauthorized code to be loaded. This bug was first introduced in Puppet Agent 1.3.0.
cvelistv5nvd
CVE-2016-5714HIGHCVSS 7.2≥ 1.3.6, ≤ 1.7.02017-10-18
CVE-2016-5714 [HIGH] CWE-284 CVE-2016-5714: Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow re
Puppet Enterprise 2015.3.3 and 2016.x before 2016.4.0, and Puppet Agent 1.3.6 through 1.7.0 allow remote attackers to bypass a host whitelist protection mechanism and execute arbitrary code on Puppet nodes via vectors related to command validation, aka "Puppet Execution Protocol (PXP) Command Whitelist Validation Vulnerability."
nvd
CVE-2016-2786CRITICALCVSS 9.8v1.3.0v1.3.1+3 more2016-06-10
CVE-2016-2786 [CRITICAL] CWE-20 CVE-2016-2786: The pxp-agent component in Puppet Enterprise 2015.3.x before 2015.3.3 and Puppet Agent 1.3.x before
The pxp-agent component in Puppet Enterprise 2015.3.x before 2015.3.3 and Puppet Agent 1.3.x before 1.3.6 does not properly validate server certificates, which might allow remote attackers to spoof brokers and execute arbitrary commands via a crafted certificate.
nvd
CVE-2016-2785CRITICALCVSS 9.8v1.4.12016-06-10
CVE-2016-2785 [CRITICAL] CWE-284 CVE-2016-2785: Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent befo
Puppet Server before 2.3.2 and Ruby puppetmaster in Puppet 4.x before 4.4.2 and in Puppet Agent before 1.4.2 might allow remote attackers to bypass intended auth.conf access restrictions by leveraging incorrect URL decoding.
nvd